Tingting Li

Orcid: 0000-0002-6589-3706

Affiliations:
  • Zhejiang University, Hangzhou, China


According to our database1, Tingting Li authored at least 10 papers between 2023 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
TPE-Det: A Tamper-Proof External Detector via Hardware Traces Analysis Against IoT Malware.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2024

Task-Driven Quantum Device Fingerprint Identification via Modeling QNN Outcome Shift Induced by Quantum Noise.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Improving Model Robustness against Adversarial Examples with Redundant Fully Connected Layer.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Poster: Combine Topology and Traffic to Calibrate P2P Botnet Identification in Large-Scale Network.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024

Minerva: Enhancing Quantum Network Performance for High-Fidelity Multimedia Transmission.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Moirai: Optimizing Quantum Serverless Function Orchestration via Device Allocation and Circuit Deployment.
Proceedings of the IEEE International Conference on Web Services, 2024

2023
SAGE: Steering the Adversarial Generation of Examples With Accelerations.
IEEE Trans. Inf. Forensics Secur., 2023

QuCT: A Framework for Analyzing Quantum Circuit by Extracting Contextual and Topological Features.
Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 2023

HyQSAT: A Hybrid Approach for 3-SAT Problems by Integrating Quantum Annealer with CDCL.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2023

Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023


  Loading...